The Security of vUser Products
Table of content
In general, to design and use our software, security is one of the cases which has to be carefully considered.
        Not only Vuser software is no exception to this rule but also because of the essence of this software, its
        security is more sensitive than other software products in several ways.
 First, because vUser software is a
        program for recording mouse and keyboard commands, which can bring spyware to mind. Second, because of the bots
        designed using vUser Software, (WhatsApp, Twitter Bot Package, etc.) each of which may need a username or
        password or access to the customers’ phone number database and such things. Therefore, we need to explain the
        required technical details and the difference between our company and other similar companies. Our goal is
        merely to take advantage of and benefit from our knowledge in our field.
        We can clearly explain the technical issues related to the subject of vUser software security, and we resolve
        all the related concerns by proving just 1 claim. The important claim is this:
    
 
    vUser Software does not have access to the internet!
        The vUser Software only uses the Internet to check the legitimacy of your online serial number, which does not perform this check if you use an offline serial number. In general, we can prove the claim that
        vUser Software does not have access to the internet by itself and does not perform any actions in the background by the internet.
        
Install a strong firewall on your system. As you know, a firewall monitors any kind of internet connection
        on your system and because the firewall is installed, any program
        has to ask for your permission to connect to the internet. Now try different vUser software commands (except for
        Web Automation commands) and observe how your system firewall reacts. You will see that no actions related to
        the internet will be recorded and your system firewall does not show any messages to ask for permission for
        internet connection.
But how do the commands that need an internet connection, will be executed without one?
Web Automation commands can be technically explained as follows. vUser Software only issues the commands
            to the browser. It means that if the software wants to access a website, it commands a browser (Chrome,
        Firefox, etc.) to open that website. At this moment, you can observe everything happening before your eyes. The
        goal is to open a browser and go to
        the intended web page. Also while Also, while using the Download command, vUser Software sends the command of
        downloading files to a second program called WGet.exe, which is a very famous program for downloading files
        (again the command is executed before your eyes). Even for solving CAPTCHAs that have to use another site’s API
        ( 2captcha.com  ), there are no functions for direct connection to the internet and
        using Internet Explorer browser (before your eyes). 
(We have named this browser vUser Browser- but
        programmers know that this browser is in fact Internet Explorer browser that opens in a window in Embedded mode
        and we have not written hundreds of thousands of lines of code to design a new browser.) Therefore, everything
        is clear and vUser Software does not use internet commands to execute any of the commands in its functions.
        Other proof of this claim is that all the best antiviruses confirm vUser as secure software. If you try vUser
        software programs on the, you will see all famous antiviruses confirm it. This verification for a software
        product that records mouse and keyboard commands, is an authentic confirmation of the software security.
        
Another proof of software security’s confidence level is the organizations with which we have cooperated.
        Among the satisfaction letters we have received, you can see some from universities and government
        organizations, some of which impose special limitations on connecting to the internet. Therefore, since the
        start of our work, to cooperate with these organizations, we have also designed the software lock and other
        required things in a way to be used without an internet connection (we have offered a complete explanation about
        the software lock being offline in “ The License of vUser Products ”.)
        
If the proofs that have been presented so far are not enough for you, we can go beyond them and guarantee
        in writing as an official contract that vUser software does not send any kind of information to our company via
        the internet in the background. We have put samples of the contract (related to information security) on some of
        the pages of the website.
        
        To sum up, the security of your information and the security of the software has always been our important
        concern. Finally, it is worth saying that since the software is not connected to the internet, it will not cause
        any misuse and system intrusion, because, for remote system intrusion, it is required that you intrude into the
        system through the internet and a defect in the program connected to the internet. Then if a program is not
        connected to the internet, system intrusion is impossible to happen.
    
 
     
                                             
            